Sciweavers

1957 search results - page 357 / 392
» Embedded Processor Security
Sort
View
ATAL
2005
Springer
15 years 5 months ago
Formalising trust for online communities
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...
Ali Shaikh Ali, Omer F. Rana
OOPSLA
2005
Springer
15 years 5 months ago
Io: a small programming language
Io is small prototype-based programming language. The ideas in Io are mostly inspired by Smalltalk[1] (all values are objects), Self[2] (prototype-based), NewtonScript[3] (differe...
Steve Dekorte
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
15 years 5 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl
GISCIENCE
2004
Springer
144views GIS» more  GISCIENCE 2004»
15 years 5 months ago
Landmarks in the Communication of Route Directions
We investigate the understanding of landmarks using a model of embedding procedures that sees affordances established on three levels. On the first level there are landmark experie...
Elisabeth Weissensteiner, Stephan Winter
RTCSA
2003
IEEE
15 years 5 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...